Already a client?

Not a client?

Related Research

April 09, 2019Ask-An-Expert

Poll: Ways to Vet Suspicious Email Flagged by Users

How can a security team avoid becoming overloaded once end users are empowered to flag and report suspicious email? In this Viewpoints report, IANS Faculty Marcus Ranum, Kevin Beaver and Ondrej Krehel recommend several technology- and process-based solutions.

C-Level Executives Need the Most Security Training

More than half of CISOs believe C-level executives are most in need of security awareness training to protect themselves from phishing and other social engineering attacks. HR is seen as needing the least amount of security awareness training.

Overview of Russian Cyber Attack Tactics Targeting U.S. Utilities

In cyberattacks against U.S. power utilities, Russian hackers stole employee credentials to gain access to corporate systems using spear-phishing, targeted oft-visited trade publication websites and used VPNs to stay hidden and maintain network access.